Practice Free 312-38 Exam Online Questions
A company wants to implement a data backup method which allows them to encrypt the data ensuring its security as well as access at any time and from any location.
What is the appropriate backup method that should be implemented?
- A . Onsite backup
- B . Hot site backup
- C . Offsite backup
- D . Cloud backup
D
Explanation:
The most appropriate backup method for a company that wants to ensure data encryption and accessibility from any location at any time is cloud backup. Cloud backup solutions provide remote, offsite storage that can be accessed over the internet, which is ideal for ensuring data availability and security. These solutions often include robust encryption protocols to secure data during transfer and
while at rest on the cloud servers. This aligns with the need for a backup method that not only encrypts data but also allows for easy access regardless of the user’s location.
Reference: The explanation is based on standard practices in data backup and security, which are consistent with the objectives and documentation of the Certified Network Defender (CND) course. Cloud backup is widely recognized for its encryption capabilities and remote accessibility, making it a suitable choice for companies looking to secure their data backups.
Which mobile-use approach allows an organization’s employees to use devices that they are comfortable with and best fits their preferences and work purposes?
- A . BYOD
- B . COPE
- C . COBO
- D . CYOD
A
Explanation:
The mobile-use approach that allows an organization’s employees to use devices they are comfortable with and that best fit their preferences and work purposes is Bring Your Own Device (BYOD). This approach offers the most flexibility for employees, as they can bring and use their personal devices for work-related activities. It is a popular choice for companies that wish to provide a flexible work environment and cater to the diverse preferences of their employees123.
Reference: The concept of BYOD and its implications on workplace flexibility and employee preferences are well-documented in enterprise mobility management literature and align with the Certified Network Defender (CND) course’s objectives regarding understanding and managing mobile device security within an organization123.
The network administrator wants to strengthen physical security in the organization. Specifically, to implement a solution stopping people from entering certain restricted zones without proper credentials.
Which of following physical security measures should the administrator use?
- A . Bollards
- B . Fence
- C . Video surveillance
- D . Mantrap
D
Explanation:
A mantrap is a physical security mechanism designed to control access to a secure area through a small space with two sets of interlocking doors. It is an effective measure to prevent unauthorized access, as it allows only one person to pass through at a time after authentication, thereby stopping any attempt at ‘tailgating’ or ‘piggybacking’ where an unauthorized individual might try to follow an authorized person into a restricted zone.
Reference: The concept of a mantrap as a physical security control is aligned with the EC-Council’s Certified Network Defender (CND) program, which covers the protect, detect, respond, and predict approach to network security. The CND program emphasizes the importance of various security controls, including physical security measures, to safeguard against unauthorized access and ensure the integrity of the network environment12.
Jeanne is working as a network administrator in an IT company. She wants to control/limit container access to CPU, memory, swap, block IO (rates), network.
Which Linux kernel feature allows Jeanne to manage, restrict, and audit groups of the process?
- A . Cgroups
- B . LSMs
- C . Seccomp
- D . Userns
A
Explanation:
Cgroups, or control groups, are a feature of the Linux kernel that allows system administrators to allocate, limit, and monitor the resources used by sets of processes. Jeanne can use cgroups to manage and restrict access to CPU, memory, swap, block IO rates, and network resources for containers. This feature also enables the auditing of process groups, making it possible to track the resource usage and ensure that each container only uses its allocated share, preventing any single process from monopolizing system resources.
Reference: The functionality of cgroups is well-documented in the Linux kernel documentation and is a fundamental topic in system administration, which is relevant to the objectives of the EC-Council’s Certified Network Defender (CND) program. The use of cgroups for managing system resources is also a standard practice in Linux-based environments12.
Which of the following wireless encryption provides enhanced password protection, secured IoT connections, and encompasses stronger encryption techniques?
- A . WEP
- B . WPA
- C . WPA2
- D . WPA3
D
Explanation:
WPA3 is the latest wireless encryption standard that provides enhanced password protection, secured IoT connections, and encompasses stronger encryption techniques. It is designed to replace WPA2 and offers improved security features. WPA3 provides robust protections even when users choose weak passwords, and simplifies the process of securing access to Wi-Fi networks. It also offers individualized data encryption to protect data on public networks and a more secure handshake process that prevents offline dictionary attacks. For IoT devices, WPA3 supports Easy Connect, which simplifies the process of connecting devices without a display.
Reference: The information provided is based on the evolution of wireless security protocols and their features as outlined in various authoritative sources on network security12. For the most accurate and detailed reference, it is recommended to consult the official documents and study guides from the Certified Network Defender (CND) course by the EC-Council.
The network administrator wants to strengthen physical security in the organization. Specifically, to implement a solution stopping people from entering certain restricted zones without proper credentials.
Which of following physical security measures should the administrator use?
- A . Video surveillance
- B . Fence
- C . Mantrap
- D . Bollards
C
Explanation:
A mantrap is a physical security mechanism designed to control access to a secure area through a small space that can only fit one person. It typically consists of two sets of interlocking doors. The first set of doors must close before the second set opens, effectively trapping the individual temporarily. This allows security personnel to verify the person’s credentials before granting them access to the restricted zone. Mantraps are particularly effective in sensitive areas where strict access control is required.
Reference: The concept of a mantrap as a physical security measure is discussed in various security frameworks and guidelines. It is a recognized method for strengthening physical security by controlling individual access to secure areas, as outlined in security best practices and standards123.
What should a network administrator perform to execute/test the untrusted or untested programs or code from untrusted or unverified third-parties without risking the host system or OS?
- A . Application Whitelisting
- B . Application Blacklisting
- C . Deployment of WAFs
- D . Application Sandboxing
D
Explanation:
Application sandboxing is a security technique that allows untrusted or untested programs or code to be executed in a separate, restricted environment known as a sandbox. This environment is isolated from the host system and operating system, ensuring that any potential malicious behavior contained within the code cannot affect the host. It’s a way to test and execute third-party applications without risking the integrity or security of the main system. Sandboxing provides a tightly controlled set of resources for guest programs to run in, such as scratch space on disk and memory, which prevents the programs from affecting other processes and data on the host system.
Reference: The concept of application sandboxing is covered in the EC-Council’s Certified Network Defender (CND) program, which includes key topics such as application whitelisting, blacklisting, and sandboxing. The hands-on lab exercises in the CND program help demonstrate skills in these areas, including application sandboxing1.
————is a group of broadband wireless communications standards for Metropolitan Area
Networks (MANs)
- A . 802.15
- B . 802.16
- C . 802.15.4
- D . 802.12
B
Explanation:
The IEEE 802.16 is a series of wireless broadband standards, also known as Wireless MAN, that are designed for Metropolitan Area Networks (MANs). This standard specifies the air interface, including the medium access control layer (MAC) and physical layer (PHY), of combined fixed and mobile point-to-multipoint broadband wireless access systems. It supports multiple services and enables the deployment of interoperable multivendor broadband wireless access products.
Reference: The information is based on the IEEE Standard for Local and metropolitan area networks Part 16: Air Interface for Broadband Wireless Access Systems, which is detailed in the IEEE 802.16-2009 document1. Additionally, the Wikipedia page for IEEE 802.16 provides an overview of the standard’s purpose for broadband wireless metropolitan area networks2.
Fargo, head of network defense at Globadyne Tech, has discovered an undesirable process in several Linux systems, which causes machines to hang every 1 hour.
Fargo would like to eliminate it; what command should he execute?
- A . # update-rc.d -f [service name] remove
- B . # service [service name] stop
- C . # ps ax | grep [Target Process]
- D . # kill -9 [PID]
D
Explanation:
To eliminate an undesirable process that is causing Linux systems to hang, Fargo should use the command # kill -9 [PID]. This command sends the SIGKILL signal to the process with the specified PID (Process ID), which forcefully stops the process immediately. The kill -9 command is used when a process cannot be terminated using normal shutdown commands. It is important to note that this command should be used with caution, as it does not allow the process to perform any cleanup operations before shutting down.
Reference: The use of the kill command is a common practice in Linux system administration for terminating unresponsive processes.
The Certified Network Defender (CND) training includes understanding and managing Linux processes as part of network defense strategies.
As a network administrator, you have implemented WPA2 encryption in your corporate wireless network. The WPA2’s _________integrity check mechanism provides security against a replay attack
- A . CRC-32
- B . CRC-MAC
- C . CBC-MAC
- D . CBC-32
C
Explanation:
The integrity check mechanism used by WPA2 to provide security against replay attacks is the Cipher Block Chaining Message Authentication Code (CBC-MAC). This mechanism is part of the protocol suite that ensures data integrity and authenticity by using a combination of cipher block chaining (CBC) and message authentication code (MAC) to produce a secure and unique code for each data packet.
Reference: This information is consistent with the security protocols outlined in WPA2 standards, which specify the use of CBC-MAC for integrity checks12.